BD Totalys MultiProcessor, versions 1.70 and earlier, contain hardcoded credentials. If exploited, threat actors may be able to access, modify or delete sensitive information, including electronic protected health information (ePHI), protected health information (PHI) and personally identifiable information (PII). Customers using BD Totalys MultiProcessor version 1.70 with Microsoft Windows 10 have additional operating system hardening configurations which increase the attack complexity required to exploit this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-43561 BD Totalys MultiProcessor, versions 1.70 and earlier, contain hardcoded credentials. If exploited, threat actors may be able to access, modify or delete sensitive information, including electronic protected health information (ePHI), protected health information (PHI) and personally identifiable information (PII). Customers using BD Totalys MultiProcessor version 1.70 with Microsoft Windows 10 have additional operating system hardening configurations which increase the attack complexity required to exploit this vulnerability.
Fixes

Solution

This vulnerability is scheduled to be remediated in the BD Totalys MultiProcessor version 1.71 software release expected in the fourth quarter of 2022.


Workaround

Ensure physical access controls are in place and only authorized end-users have access to the BD Totalys™ MultiProcessor. If the BD Totalys MultiProcessor must be connected to a network, ensure industry standard network security policies and procedures are followed.

History

Wed, 30 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: BD

Published:

Updated: 2025-04-30T20:26:41.219Z

Reserved: 2022-09-08T00:00:00.000Z

Link: CVE-2022-40263

cve-icon Vulnrichment

Updated: 2024-08-03T12:14:39.984Z

cve-icon NVD

Status : Modified

Published: 2022-11-04T19:15:11.087

Modified: 2024-11-21T07:21:09.190

Link: CVE-2022-40263

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.